Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; BEH… Plus…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Frais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 18.13], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; B… Plus…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Frais d'envoi EUR 18.13 Details... |
2009, ISBN: 3642108466
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Plus…
Weltbild.de Nr. 22424477. Frais d'envoi, 2-5 Werktage, DE. (EUR 0.00) Details... |
2009, ISBN: 9783642108464
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As future generation info… Plus…
booklooker.de |
Security Technology: International Conference, Sectech 2009, Held As Part of the Future Generation Information Technology Conference, Fgit 2009, Jeju Island, Korea, Decemb - Livres de poche
2009, ISBN: 9783642108464
Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 308 pages. 9.00x6.00x0.50 inches., Springer-Verlag New York Inc, 2009, 6
Biblio.co.uk |
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; BEH… Plus…
Dominik Slezak:
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 18.13], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; B… Plus…
2009
ISBN: 3642108466
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Plus…
2009, ISBN: 9783642108464
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As future generation info… Plus…
Security Technology: International Conference, Sectech 2009, Held As Part of the Future Generation Information Technology Conference, Fgit 2009, Jeju Island, Korea, Decemb - Livres de poche
2009, ISBN: 9783642108464
Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 308 pages. 9.00x6.00x0.50 inches., Springer-Verlag New York Inc, 2009, 6
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Security Technology
EAN (ISBN-13): 9783642108464
ISBN (ISBN-10): 3642108466
Version reliée
Livre de poche
Date de parution: 2009
Editeur: Springer Berlin Heidelberg
308 Pages
Poids: 0,488 kg
Langue: eng/Englisch
Livre dans la base de données depuis 2009-10-17T03:06:56+02:00 (Zurich)
Page de détail modifiée en dernier sur 2024-04-04T20:07:14+02:00 (Zurich)
ISBN/EAN: 9783642108464
ISBN - Autres types d'écriture:
3-642-10846-6, 978-3-642-10846-4
Autres types d'écriture et termes associés:
Auteur du livre: slezak, tai, fang, dominik, kim chi, arnett
Titre du livre: security 2009, joaquin sorolla, proceedings the, generation, island, science and information technology, science korea technology, science and technology and the future
Données de l'éditeur
Auteur: Dominik Slezak
Titre: Communications in Computer and Information Science; Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
Editeur: Springer; Springer Berlin
308 Pages
Date de parution: 2009-11-24
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 308 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; BitTorrent; Broadcast; Code; MIMO; Partition; authentication; behavior models; communication; cryptography; malvare detection; metrics; privacy; signatures; urban computing; wireless sensors; Cryptology; Computer Communication Networks; Data Structures and Information Theory; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Engineering and Networks; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Informationstheorie; Mathematik für Informatiker; Diskrete Mathematik; Computerhardware; EA
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9781450320863 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V3 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450320863 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V3 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450320115 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V2 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450312271 IPSN 12 Proceedings of the 11th International Conference on Information Processing in Sensor Networks IPSN 12 Conference Committee Author (IPSN 12 Conference Committee)
- 9780769524979 Information Technology: 2006 3rd International Conference New Generation (Itng) (IEEE Conference Proceedings) (n/a)
- 9783642108471 Security Technology (Dominik Slezak; Tai-hoon Kim; Wai-chi Fang; Kirk P. Arnett (Hrsg.))
< pour archiver...